摘要 |
PROBLEM TO BE SOLVED: To solve the problem that various kinds of access history exists to each piece of software such as an OS, a DBMS, however, functions for detection of unauthorized access from collected logs, for early detection and prevention of information leakage are insufficient. SOLUTION: Expansion of confidential information leakage is prevented by detecting an unauthorized user from an access log by adding a function for setting/managing an unauthorized access pattern to a collecting function of the access log and adding a function for executing more minute log output to an operation by the unauthorized access user and informing an operation manager of the unauthorized access by every access by e-mail. COPYRIGHT: (C)2007,JPO&INPIT |